At 10:01 PM 10/4/2000 -0400, Kenneth E. Lussier wrote:
ah! i see the error in your ways.....(i think) :-)
did you search for openBSD? if so on a lot of postings they say - this
problem was fixed in openbsd 6 months ago...that could make them show up in
a search.....
look at this
http://www.openbsd.org/security.html#27
thats all the security listing for ver 2.7. a lot of things on that list
aren't installed by default....i'm not quite sure what they mean by
default.....you can DL and install the bare minimum and it totals ~50 megs.....
anyways look at this too..
http://www.openbsd.org/errata.html
hope that this helps...
~kurth
>I have a simple question. Several people today have mentioned that
>OpenBSD is more secure. I won't get into that. But, several people made
>the claim that there hasn't been a single remote exploit in OpenBSD in
>over three years. I've heard this claim a lot out of the OpenBSD folks.
with the default install - a lot of what you listed below is add on
software.....lets look at it...
>So, I was parusing Security Foucus, and I decided to do a little search
>for OpenBSD. Below are the results of that search. Three quarters of
>these are remote (and I'm not counting DoS). Am I missing something, or
>are the OpenBSD folks just not looking??
>
>Kenny
>
>
> 2000-10-04: Multiple Vendor BSD libutil pw_error() Format String
>Vulnerability
> 2000-10-04: Multiple Vendor BSD fstat Format String Vulnerability
> 2000-09-30: scp File Create/Overwrite Vulnerability
> 2000-09-26: Multiple Vendor lpr Format String Vulnerability
> 2000-09-17: OpenBSD "empty" AH/ESP Packet Remote Denial of Service
>Vulnerability
> 2000-08-25: Multiple Vendor mgetty Symbolic Link Traversal
>Vulnerability
> 2000-08-17: X-Chat Command Execution Via URLs Vulnerability
> 2000-08-15: xlockmore User Supplied Format String Vulnerability
> 2000-08-08: Multiple Vendor mopd User Inputted Data Used as Format
>String Vulnerability
> 2000-08-08: Multiple Vendor mopd Buffer Overflow Vulnerability
> 2000-07-11: BB4 Technologies Big Brother Directory Traversal
>Vulnerability
> 2000-07-09: LPRng Incorrect Installation Permissions Vulnerability
> 2000-07-05: Multiple Vendor ftpd setproctitle() Format String
>Vulnerability
> 2000-06-11: BB4 Big Brother CGI File Creation Vulnerability
> 2000-06-08: OpenSSH UseLogin Vulnerability
> 2000-06-01: Multiple Vendor *BSD Denial of Service Vulnerability
> 2000-05-29: Xlockmore 4.16 Buffer Overflow Vulnerability
> 2000-05-29: Multiple Vendor BSD Semaphore IPC Denial Of Service
>Vulnerability
> 2000-05-10: Matt Wright FormMail Environmental Variables Disclosure
>Vulnerability
> 2000-02-24: SSH client xauth Vulnerability
> 2000-01-21: Multiple Vendor BSD /proc File Sytem Vulnerability
> 2000-01-19: Multiple Vendor BSD make /tmp Race Condition Vulnerability
> 1999-09-05: Multiple Vendor setsockopt() Denial of Service
>Vulnerability
> 1999-08-09: Multiple Vendor profil(2) Vulnerability
> 1999-07-02: BSD UFS Secure Level 1 Vulnerability
> 1999-02-17: Multiple Vendor Lsof Buffer Overflow Vulnerability
> 1998-12-21: Multiple Vendor TCP/IP Implementations Vulnerability
> 1998-04-21: Multiple Vendor BNU uucpd Buffer Overflow Vulnerability
> 1997-09-01: Multiple Vendor vacation(1) Vulnerability
>
>**********************************************************
>To unsubscribe from this list, send mail to
>[EMAIL PROTECTED] with the following text in the
>*body* (*not* the subject line) of the letter:
>unsubscribe gnhlug
>**********************************************************
Kurth Bemis - Network/Systems Administrator, USAExpress.net/Ozone Computer
[EMAIL PROTECTED]
http://www.usaexpress.net/kurth
ICQ - 6624050
Call Sign - N1TYW
PGP key available - http://www.usaexpress.net/kurth/pgp
Fight Weak Encryption! Donate your wasted CPU cycles to Distributed.net
(http://www.distributed.net)
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************